Susan Bradley

Contributing Writer

Susan Bradley has been patching since before the Code Red/Nimda days and remembers exactly where she was when SQL slammer hit (trying to buy something on eBay and wondering why the Internet was so slow). She writes the Patch Watch column for Askwoody.com, is a moderator on the PatchManagement.org listserve, and writes a column of Windows security tips for CSOonline.com. In real life, she’s the IT wrangler at her firm, Tamiyasu, Smith, Horn and Braun, where she manages a fleet of Windows servers, Microsoft 365 deployments, Azure instances, desktops, a few Macs, several iPads, a few Surface devices, several iPhones and tries to keep patches up to date on all of them. In addition, she provides forensic computer investigations for the litigation consulting arm of the firm. She blogs at https://www.askwoody.com/tag/patch-lady-posts/ and is on twitter at @sbsdiva. She lurks on Twitter and Facebook, so if you are on Facebook with her, she really did read what you posted. She has a SANS/GSEC certification in security and prefers Heavy Duty Reynolds wrap for her tinfoil hat.

How to prevent sideloading attacks in Windows and Office 365

Why small businesses should consider Microsoft Defender for Business

Why small businesses should consider Microsoft Defender for Business

Defender for Business brings EDR and threat monitoring features found in more expensive Windows licenses to smaller organizations.

How to spot and block cryptominers on your network

How to spot and block cryptominers on your network

Cryptominer malware is stealthy and drags down network and device performance. Some simple tasks and basic tools can minimize its impact.

How to configure Microsoft Defender for cloud-based attacks

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

5 steps to security incident response planning

5 steps to security incident response planning

Most firms will experience a breach or vulnerability that exposes sensitive data. Minimizing impact on business and reputation depends on having a strong response plan before an incident happens.

New Windows browser security options and guidance: What you need to know

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.

Time to check software and security settings for Windows network vulnerabilities

Time to check software and security settings for Windows network vulnerabilities

October is Cybersecurity Awareness Month, and that's a good excuse to review what's running on your network to identify security risks.

Microsoft Exchange Emergency Mitigation: What admins need to know

Microsoft Exchange Emergency Mitigation: What admins need to know

The Emergency Mitigation service adds protections to Exchange Server in the wake of recent zero-day compromises.

4 lessons from recent Microsoft Azure cloud vulnerabilities

4 lessons from recent Microsoft Azure cloud vulnerabilities

The discovery of serious vulnerabilities in Azure's Cosmos database and Linux VM shows you can't take cloud security for granted. Here's how to reduce the risk from current and future vulnerabilities.

How to mitigate the Microsoft Office zero-day attack

How to mitigate the Microsoft Office zero-day attack

Follow this advice to block malicious Office files from doing harm to your network even if you've implemented Microsoft's recommended actions.

How to find a security-savvy MSP

How to find a security-savvy MSP

Not all managed service providers are strong on security. Here's how to weed out those that will put your small- to medium-sized business at risk.

5 steps to improve security on network PCs that can’t run Windows 11

5 steps to improve security on network PCs that can’t run Windows 11

Many networked systems will not be compatible with Windows 11 and its advanced security features. Here's how to keep Windows 10 devices from being a weak link.

Load More